Cyber Threat Hunting
Rating :
Course Length:
2 days

Overview:
This course covers the fundamentals of Cyber Threat Hunting; how to build out a hunt program in your own environment; and how to identify, define, and execute a hunt mission. The course introduces the essential concepts for network and endpoint hunting and then allows learners to apply techniques to hunt for anomalous patterns. Hands-on activities follow real-world use cases to identify attacker techniques. Learners leave the course with critical information for establishing hunt programs within their organization, templates that can be used to document hunt missions, and concrete use cases that they can leverage to hunt in their own environment. Data for lab activities has been collected using the following Trellix technologies: Helix, Endpoint Security (HX) and Trellix Network Forensics.

Who Should Attend:
Security analysts, incident responders, and threat hunters who use Trellix tools to hunt for cyber threats. This is a fast-paced technical course intended for students with some background in incident response, forensic analysis, network traffic analysis, log analysis, security assessments, and/or penetration testing. It is also well suited for those managing incident response or hunt teams. Learners do not need a prior knowledge of specific Trellix technology to benefit from the instruction.

To learn more about this course, or to schedule a private session for your team, contact your Trellix account manager.

1/28/2025 - 1/29/2025
Time Zone : (GMT-06:00) Central Time (US & Canada)
Seats Remaining : 8
Venue : Virtual Student Remote Classroom Online
Address : Hands-on labs in the cloud,USA
Cost
Number of Vouchers Needed: 21
*Voucher quantity and cost can vary by region and local currency. Please contact your region team for further details. Default delivery cost is for US using USD$.
Questions
Contact your regional Trellix Training team